Репозиторий, содержащий решения тасков и описание инцидента - RedShift190
☆10Dec 26, 2023Updated 2 years ago
Alternatives and similar repositories for RedShift.190__WriteUps
Users that are interested in RedShift.190__WriteUps are comparing it to the libraries listed below
Sorting:
- ☆14Mar 18, 2024Updated last year
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- В данном репозитории находятся райтапы с различных CTF. Также здесь представлена сводная таблица по всем пройденным важным ив ентам☆10Dec 18, 2025Updated 2 months ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 2 weeks ago
- Wazuh - Virtual Machines (OVA and AMI)☆16Updated this week
- Kaspersky Security Center: custom decoders and rules for Wazuh SIEM☆18Aug 16, 2024Updated last year
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- ☆10Sep 11, 2023Updated 2 years ago
- ☆10Nov 16, 2021Updated 4 years ago
- 2 factor authentification using SMS (over gsm modem or payed sms gateway) / Synology Chat / Telegram bot when users or any equipment crea…☆12Sep 21, 2020Updated 5 years ago
- ☆27Dec 27, 2025Updated 2 months ago
- Automate Burp Suite Professional setup on macOS with multi-version support, JDK 21, built-in keygen, and instant launcher for pentesters …☆21Sep 27, 2025Updated 5 months ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- ☆11Jul 13, 2022Updated 3 years ago
- simple shellcode injector for Windows / Process Hollowing☆15Jun 26, 2024Updated last year
- ☆21Updated this week
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- ☆16Nov 27, 2023Updated 2 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆35Oct 24, 2025Updated 4 months ago
- Using a Telegram Chat to Act as a Command and Control Server with Powershell for Windows☆20Jun 25, 2024Updated last year
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Nov 12, 2024Updated last year
- Ru-WireGuard reference implementation: WireGuard protocol with GOST crypto algorithms☆16Dec 22, 2020Updated 5 years ago
- Cobalt Strike Wrapper☆19Aug 13, 2025Updated 6 months ago
- Free firewall for windows☆17Nov 5, 2008Updated 17 years ago
- The aim of this workshop is to provide a hands-on experience with monitoring Docker containers using Grafana Alloy, Prometheus and Loki.☆20Updated this week
- Scapy implemented in GO Programming language☆21Sep 9, 2025Updated 5 months ago
- Explore effective penetration testing techniques with Metasploit☆17Jan 30, 2023Updated 3 years ago
- Automation tool designed to simplify the analysis of PCAP (Packet Capture) files☆18Mar 15, 2024Updated last year
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- A Compose Multiplatform library to provide extended ripple indication support☆24Nov 8, 2025Updated 3 months ago
- Bring runZero Exposure Management into BloodHound☆44Nov 19, 2025Updated 3 months ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders☆19Feb 2, 2026Updated 3 weeks ago
- In this project, we are going to make an online exam system(ASP.NET Webform) where an admin can take exam for the current student who are…☆20Jul 21, 2022Updated 3 years ago
- ☆20Oct 17, 2021Updated 4 years ago
- Python3 HTTP Server with upload functionality☆20Dec 4, 2023Updated 2 years ago